|
|
|
|
LEADER |
03551nam a2200745 a 4500 |
001 |
29619 |
003 |
IGIG |
005 |
20101120132449.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
101115s2008 paua fsb 000 0 eng d |
010 |
# |
# |
|z 2007031962
|
020 |
# |
# |
|a 9781599049380 (ebook)
|
020 |
# |
# |
|a 1599049384 (ebook)
|
020 |
# |
# |
|z 9781599049373 (hardcover)
|
020 |
# |
# |
|z 1599049376 (hardcover)
|
024 |
7 |
# |
|a 10.4018/978-1-59904-937-3
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00544754
|
035 |
# |
# |
|a (OCoLC)430970939
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a QA76.9.A25
|b I54152 2008e
|
082 |
0 |
4 |
|a 005.8
|2 22
|
245 |
0 |
0 |
|a Information security and ethics
|b concepts, methodologies, tools and applications /
|c Hamid Nemati, [editor].
|h [electronic resource] :
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2008.
|
300 |
# |
# |
|a electronic texts (lxxvi, 4037 p. : ill.) :
|b digital files.
|
490 |
1 |
# |
|a Contemporary research in information science and technology
|
500 |
# |
# |
|a "Premier reference source"--Cover.
|
504 |
# |
# |
|a Includes bibliographical references.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a "This compilation serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Description based on title screen (IGI Global, viewed Nov. 15, 2010).
|
650 |
# |
0 |
|a Computer security.
|
650 |
# |
0 |
|a Information technology
|x Security measures.
|
650 |
# |
0 |
|a Information technology
|x Moral and ethical aspects.
|
653 |
# |
# |
|a Codes of ethics in virtual communities
|
653 |
# |
# |
|a Designing secure data warehouses
|
653 |
# |
# |
|a Digital watermarking for multimedia security management
|
653 |
# |
# |
|a E-business systems security for intelligent enterprise
|
653 |
# |
# |
|a E-government and denial of service attacks
|
653 |
# |
# |
|a E-health security and privacy
|
653 |
# |
# |
|a Electronic banking and information assurance issues
|
653 |
# |
# |
|a Enforcing privacy on the Semantic Web
|
653 |
# |
# |
|a Ethical dilemmas in online research
|
653 |
# |
# |
|a Ethical issues
|
653 |
# |
# |
|a Ethics of digital government
|
653 |
# |
# |
|a Information security management
|
653 |
# |
# |
|a Integrating security and software engineering
|
653 |
# |
# |
|a Multimedia security and digital rights management technology
|
653 |
# |
# |
|a Privacy and confidentiality issues in data mining
|
653 |
# |
# |
|a Privacy and security in E-Learning
|
653 |
# |
# |
|a Privacy and trust in agent-supported distributed learning
|
653 |
# |
# |
|a Privacy-preserving data mining
|
653 |
# |
# |
|a Security and privacy in distance education
|
653 |
# |
# |
|a Security and trust in mobile multimedia
|
653 |
# |
# |
|a Security in service-oriented architecture
|
653 |
# |
# |
|a Trust and security in ambient intelligence
|
700 |
1 |
# |
|a Nemati, Hamid R.,
|d 1958-
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC)2007031962
|
776 |
0 |
8 |
|i Print version:
|w (DLC) 2007031962
|z 9781599049373
|z 1599049376
|
830 |
# |
0 |
|a Contemporary research in information science and technology.
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-937-3
|z View fulltext via EzAccess
|